aboutsummaryrefslogtreecommitdiffstats
path: root/widgets/aerc.go
diff options
context:
space:
mode:
authorMoritz Poldrack <git@moritz.sh>2023-03-04 10:56:47 +0100
committerRobin Jarry <robin@jarry.cc>2023-03-07 00:13:03 +0100
commitd3dea73aa53791a94f86c31689a10880fabeb84c (patch)
treeae815295162ff7431d47fd16a2e74d0cb8465222 /widgets/aerc.go
parentc6a08b1003a2cb02d86002541ead0f9b38db1beb (diff)
downloadaerc-d3dea73aa53791a94f86c31689a10880fabeb84c.tar.gz
ipc: allow triggering internal commands via IPC
In order to make automation easier, it's useful to be able to send commands to aerc via IPC. This can be done by calling the aerc binary followed by a colon and the command to run. For example: aerc :read && aerc :remark && aerc :archive month Security to ensure no malicious commands are run is deferred to the user. By default the socket is only writable by the user. This is considered sufficient as the potential harm an attacker gaining write-access to a user's session can cause is significantly greater than "can delete some emails". To ensure users with an according threat model, it is possible to disable command IPC. mailto-handling is unaffected even though it works over IPC as it is absolutely non-destructive. Signed-off-by: Moritz Poldrack <git@moritz.sh> Acked-by: Robin Jarry <robin@jarry.cc>
Diffstat (limited to 'widgets/aerc.go')
-rw-r--r--widgets/aerc.go6
1 files changed, 6 insertions, 0 deletions
diff --git a/widgets/aerc.go b/widgets/aerc.go
index 572a123c..70083860 100644
--- a/widgets/aerc.go
+++ b/widgets/aerc.go
@@ -782,6 +782,12 @@ func (aerc *Aerc) Mbox(source string) error {
return nil
}
+func (aerc *Aerc) Command(args []string) error {
+ defer ui.QueueRedraw()
+ defer ui.Invalidate()
+ return aerc.cmd(args, nil, nil)
+}
+
func (aerc *Aerc) CloseBackends() error {
var returnErr error
for _, acct := range aerc.accounts {